CVE-2024-20455

Oct. 24, 2024, 7:47 p.m.

8.6
High

Description

A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.

Product(s) Impacted

Vendor Product Versions
Cisco
  • Ios Xe
  • Ios Xe Sd-wan
  • 17.1.1, 17.1.1a, 17.1.1s, 17.1.1t, 17.1.3, 17.2.1, 17.2.1a, 17.2.1r, 17.2.1v, 17.2.2, 17.2.3, 17.3.1, 17.3.1a, 17.3.1w, 17.3.1x, 17.3.1z, 17.3.2, 17.3.2a, 17.3.3, 17.3.4, 17.3.4a, 17.3.4b, 17.3.4c, 17.3.5, 17.3.5a, 17.3.5b, 17.3.6, 17.3.7, 17.3.8, 17.3.8a, 17.4.1, 17.4.1a, 17.4.1b, 17.4.2, 17.4.2a, 17.5.1, 17.5.1a, 17.6.1, 17.6.1a, 17.6.1w, 17.6.1x, 17.6.1y, 17.6.1z, 17.6.1z1, 17.6.2, 17.6.3, 17.6.3a, 17.6.4, 17.6.5, 17.6.5a, 17.6.6, 17.6.6a, 17.7.1, 17.7.1a, 17.7.1b, 17.7.2, 17.8.1, 17.8.1a, 17.9.1, 17.9.1a, 17.9.1w, 17.9.1x, 17.9.1x1, 17.9.1y, 17.9.1y1, 17.9.2, 17.9.2a, 17.9.3, 17.9.3a, 17.9.4, 17.9.4a, 17.9.5, 17.9.5a, 17.9.5b, 17.10.1, 17.10.1a, 17.10.1b, 17.11.1, 17.11.1a, 17.11.99sw, 17.12.1, 17.12.1a, 17.12.1w, 17.12.2, 17.12.2a, 17.13.1, 17.13.1a
  • 17.5.1a, 17.6.1a, 17.6.2, 17.6.4, 17.7.1a, 17.8.1a, 17.9.1a, 17.9.2a, 17.9.3a, 17.9.4, 17.10.1a, 17.11.1a, 17.12.1a, 17.13.1a

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-371
None
None

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o cisco ios_xe 17.1.1 / / / / / / /
o cisco ios_xe 17.1.1a / / / / / / /
o cisco ios_xe 17.1.1s / / / / / / /
o cisco ios_xe 17.1.1t / / / / / / /
o cisco ios_xe 17.1.3 / / / / / / /
o cisco ios_xe 17.2.1 / / / / / / /
o cisco ios_xe 17.2.1a / / / / / / /
o cisco ios_xe 17.2.1r / / / / / / /
o cisco ios_xe 17.2.1v / / / / / / /
o cisco ios_xe 17.2.2 / / / / / / /
o cisco ios_xe 17.2.3 / / / / / / /
o cisco ios_xe 17.3.1 / / / / / / /
o cisco ios_xe 17.3.1a / / / / / / /
o cisco ios_xe 17.3.1w / / / / / / /
o cisco ios_xe 17.3.1x / / / / / / /
o cisco ios_xe 17.3.1z / / / / / / /
o cisco ios_xe 17.3.2 / / / / / / /
o cisco ios_xe 17.3.2a / / / / / / /
o cisco ios_xe 17.3.3 / / / / / / /
o cisco ios_xe 17.3.4 / / / / / / /
o cisco ios_xe 17.3.4a / / / / / / /
o cisco ios_xe 17.3.4b / / / / / / /
o cisco ios_xe 17.3.4c / / / / / / /
o cisco ios_xe 17.3.5 / / / / / / /
o cisco ios_xe 17.3.5a / / / / / / /
o cisco ios_xe 17.3.5b / / / / / / /
o cisco ios_xe 17.3.6 / / / / / / /
o cisco ios_xe 17.3.7 / / / / / / /
o cisco ios_xe 17.3.8 / / / / / / /
o cisco ios_xe 17.3.8a / / / / / / /
o cisco ios_xe 17.4.1 / / / / / / /
o cisco ios_xe 17.4.1a / / / / / / /
o cisco ios_xe 17.4.1b / / / / / / /
o cisco ios_xe 17.4.2 / / / / / / /
o cisco ios_xe 17.4.2a / / / / / / /
o cisco ios_xe 17.5.1 / / / / / / /
o cisco ios_xe 17.5.1a / / / / / / /
o cisco ios_xe 17.6.1 / / / / / / /
o cisco ios_xe 17.6.1a / / / / / / /
o cisco ios_xe 17.6.1w / / / / / / /
o cisco ios_xe 17.6.1x / / / / / / /
o cisco ios_xe 17.6.1y / / / / / / /
o cisco ios_xe 17.6.1z / / / / / / /
o cisco ios_xe 17.6.1z1 / / / / / / /
o cisco ios_xe 17.6.2 / / / / / / /
o cisco ios_xe 17.6.3 / / / / / / /
o cisco ios_xe 17.6.3a / / / / / / /
o cisco ios_xe 17.6.4 / / / / / / /
o cisco ios_xe 17.6.5 / / / / / / /
o cisco ios_xe 17.6.5a / / / / / / /
o cisco ios_xe 17.6.6 / / / / / / /
o cisco ios_xe 17.6.6a / / / / / / /
o cisco ios_xe 17.7.1 / / / / / / /
o cisco ios_xe 17.7.1a / / / / / / /
o cisco ios_xe 17.7.1b / / / / / / /
o cisco ios_xe 17.7.2 / / / / / / /
o cisco ios_xe 17.8.1 / / / / / / /
o cisco ios_xe 17.8.1a / / / / / / /
o cisco ios_xe 17.9.1 / / / / / / /
o cisco ios_xe 17.9.1a / / / / / / /
o cisco ios_xe 17.9.1w / / / / / / /
o cisco ios_xe 17.9.1x / / / / / / /
o cisco ios_xe 17.9.1x1 / / / / / / /
o cisco ios_xe 17.9.1y / / / / / / /
o cisco ios_xe 17.9.1y1 / / / / / / /
o cisco ios_xe 17.9.2 / / / / / / /
o cisco ios_xe 17.9.2a / / / / / / /
o cisco ios_xe 17.9.3 / / / / / / /
o cisco ios_xe 17.9.3a / / / / / / /
o cisco ios_xe 17.9.4 / / / / / / /
o cisco ios_xe 17.9.4a / / / / / / /
o cisco ios_xe 17.9.5 / / / / / / /
o cisco ios_xe 17.9.5a / / / / / / /
o cisco ios_xe 17.9.5b / / / / / / /
o cisco ios_xe 17.10.1 / / / / / / /
o cisco ios_xe 17.10.1a / / / / / / /
o cisco ios_xe 17.10.1b / / / / / / /
o cisco ios_xe 17.11.1 / / / / / / /
o cisco ios_xe 17.11.1a / / / / / / /
o cisco ios_xe 17.11.99sw / / / / / / /
o cisco ios_xe 17.12.1 / / / / / / /
o cisco ios_xe 17.12.1a / / / / / / /
o cisco ios_xe 17.12.1w / / / / / / /
o cisco ios_xe 17.12.2 / / / / / / /
o cisco ios_xe 17.12.2a / / / / / / /
o cisco ios_xe 17.13.1 / / / / / / /
o cisco ios_xe 17.13.1a / / / / / / /
o cisco ios_xe_sd-wan 17.5.1a / / / / / / /
o cisco ios_xe_sd-wan 17.6.1a / / / / / / /
o cisco ios_xe_sd-wan 17.6.2 / / / / / / /
o cisco ios_xe_sd-wan 17.6.4 / / / / / / /
o cisco ios_xe_sd-wan 17.7.1a / / / / / / /
o cisco ios_xe_sd-wan 17.8.1a / / / / / / /
o cisco ios_xe_sd-wan 17.9.1a / / / / / / /
o cisco ios_xe_sd-wan 17.9.2a / / / / / / /
o cisco ios_xe_sd-wan 17.9.3a / / / / / / /
o cisco ios_xe_sd-wan 17.9.4 / / / / / / /
o cisco ios_xe_sd-wan 17.10.1a / / / / / / /
o cisco ios_xe_sd-wan 17.11.1a / / / / / / /
o cisco ios_xe_sd-wan 17.12.1a / / / / / / /
o cisco ios_xe_sd-wan 17.13.1a / / / / / / /

CVSS Score

8.6 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Date

  • Published: Sept. 25, 2024, 5:15 p.m.
  • Last Modified: Oct. 24, 2024, 7:47 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

ykramarz@cisco.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.